Recently, mobile devices, such as wireless sensors, smart tags, RFIDs, tablets, PDAs and smart phones, have become pervasive and attracted significant interest from academia, industry, and standardization organizations. Integrating the latest cloud computing technology, these mobile devices are playing a more and more important role in computing and communication systems. Millions of mobile applications have been developed in the last several years, which dramatically changes the way that people manage their daily life, for example, mobile payment and mobile social networks have changed our life significantly. When the storage, processing and communicating of many sensitive data have been migrated to mobile devices, privacy, security and trust become critical factors for the acceptance of mobile applications and maintaining a reliable mobile environment becomes an essential requirement. Several favorable characteristics of mobile andwireless devices, including portability, mobility, and sensitivity, further impose the challenge of security and privacy in these systems. Finally, the constrained hardware and software supports of those devices make it even more challenging to build a secure, privacy-preserving and trusted mobile system. Despite recent advances, many research issues still remain in the design of secure, privacypreserving, or trust architectures, protocols, algorithms, services, and applications on mobile and wireless systems. For example, when mobile devices have more storage space, higher bandwidth, and better sensing capability, more sensitive information will be stored over there and more demanding application will be created. On the other hand, operating systems running on these devices are not as powerful and reliable as those on traditional computers. Both OS layer and higher-level layer protocols are expected to enhance the security and preserve the privacy of these mobile devices. With more mobile devices being used in online social networks and various ad-hoc network systems, novel trust models are essential for new applications. New cryptographic algorithms, intrusion detection and preventionmechanisms,
Read full abstract